Date: Monday, June 15, 2015
Time: 12:00 p.m ET/ 9:00 a.m PT
In the modern enterprise privileged users are no longer entirely inside the perimeter, nor is your infrastructure. Traditional users, outsourced or offshore IT, support and development teams, and new users from mergers and acquisitions are working from increasingly distributed locations and devices and to be efficient they need the right set of privileged access across a diverse set of servers, network equipment and applications deployed on-premises and in the cloud.
So, how can an organization securely manage and monitor the use of privileged accounts for their distributed workforce without slowing down the business?
Andras Cser, VP and Principal Analyst,Forrester Research
Brad Zehring, Director of Product Management, Centrify